-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not valid JSON in response #215
Conversation
I've added a new test but I can't get it to fail locally... let's see on CI. |
@mruoss that's quick! On CI, is this using ssl, serviceaccount and token auth too? Just in case it doesn't fail, I'm thinking what else might be different. |
Okay I see... I don't think it does... |
My {:ok,
%K8s.Conn{
cluster_name: nil,
user_name: nil,
url: "https://kubernetes.default.svc",
insecure_skip_tls_verify: false,
ca_cert: <<48, .....>>,
auth: K8s.Conn.Auth.Token<...>,
middleware: %K8s.Middleware.Stack{
request: [K8s.Middleware.Request.Initialize,
K8s.Middleware.Request.EncodeBody],
response: []
},
discovery_driver: K8s.Discovery.Driver.HTTP,
discovery_opts: [],
http_provider: SpotUpkill.K8s.HTTPProvider, # switched, working
cacertfile: "/usr/src/app/_build/prod/lib/castore/priv/cacerts.pem"
}} |
ok that was not it. same result locally with token based auth: %K8s.Conn{
cluster_name: "k3d-k8s-ex",
user_name: "k3d-k8s-ex-admin",
url: "https://0.0.0.0:53225",
insecure_skip_tls_verify: true,
ca_cert: <<48, ...>>,
auth: K8s.Conn.Auth.Token<...>,
middleware: %K8s.Middleware.Stack{
request: [K8s.Middleware.Request.Initialize,
K8s.Middleware.Request.EncodeBody],
response: []
},
discovery_driver: K8s.Discovery.Driver.HTTP,
discovery_opts: [],
http_provider: K8s.Client.MintHTTPProvider,
cacertfile: "/etc/ssl/cert.pem"
} |
What's your cluster version? |
Okay, I was able to reproduce the faulty behaviour on a newer cluster (v1.25.2). I actually found a bug in my implementation. @arathunku can you test again with this branch? |
It's exactly: I've tested the branch, it works! No more errors.
Absolutely amazing @mruoss, thank you |
Thanks again for your help! |
Some weird behaviour was reported here: #48 (comment)
Adding a reliability test to verify.
Requirements for all pull requests
Additional requirements for new features